期刊文献+

DCT系数的统计模型及其接收机性能分析 被引量:2

Statistical Modeling of DCT Coefficients and Detector Performance in Terms of Receiver Operation Characteristic Curves
下载PDF
导出
摘要 隐写分析技术已经成为网络信息安全的一个重要方向,如何有效地监控和检测网络中传递的秘密信息对于保障国家安全具有重要现实意义。针对国内外学者提出各种不同的DCT系数分布模型,提出了图像的DCT系数α稳态簇模型。考虑数据的实际统计特征,系统地描述了图像DCT系数的α稳态簇模型,验证了图像DCT系数统计模型既不服从于广义高斯模型、高斯模型、Lapalacian模型,而是服从于α稳态簇模型,因为α稳态簇模型具有足够的柔韧性,随着特征指数α改变,其分布形状就会改变。同时,根据工程上简易、实用、可行性和性能好的要求,提出了一种新颖的、α稳态簇模型之一的、柯西接收机的隐藏信息盲检测方法。这种检测接收机与广义高斯接收机相比,其性能更具鲁棒性,适应性更广。与文献[8]相比,其性能不但没有下降,有的反而提高了,而且运行速度也快了几十倍。 Steganalysis technique is of great importance to network information security and how to search and detect secret messages transferred in network is crucial and practical to safeguard national security. Against a variety of DCT coefficients distribution model proposed by the scholars at home and abroad, this paper introduces the α-stable family models of the image' s DCT coefficients. Take into account real statistical properties, this paper also describes the α-stable family models of cover image' s DCT domain by the numbers. And we also testifieed by the experiment that image ' s DCT coefficients satisfy α-stable family distribution but GGD( generalized Gaussian distribution) and Gaussian distribution and Lapalacian distribution. The α-stable family models have enough flexibility, and their shape of distribution changes with characteristic index α. At same time, this paper designs a new processor to blindly hide information detection using Cauchy receiver operating machine based on project needs: facility, practicality, feasibility and performance good. This detection performance is better than GGD ' s detection performance. Compared to the reference [ 8 ] , our model performance enhanced. The operating speed is increased by scores of times.
出处 《中国图象图形学报》 CSCD 北大核心 2009年第9期1782-1789,共8页 Journal of Image and Graphics
基金 江西省教育厅科技基金项目(Gjj08462) 上海市教育发展基金会晨光计划项目(2008CGB21)
关键词 隐写分析 α稳态簇模型 接收机 ROC曲线 steganalysis, α-stable family models, receiver operating machine, ROC curves
  • 相关文献

参考文献16

  • 1Hartung F, Kutter M. Multimedia watermarking techniques [ J ]. Proceedings of IEEE, 1999,87 (7) : 1079-1107.
  • 2Zeng W, Liu B. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images[ J]. IEEE Transactions on Image Processing, 1999, 8 ( 11 ) : 1534-1548.
  • 3Giannlula A, Boulgouris N V, Hatzinakos D K, et al. Watermark detection for noisy interpolated images [ J ]. IEEE Transactions on Circuits and systems- Ⅱ: Express Briefs, 2006 ,53 (5) : 359-403.
  • 4Birney K A, Fischer T R. On the modeling of DCT and subband image data for compression [ J ]. IEEE Transactions on Image Processing. , 1995,4 ( 2 ) : 186-193.
  • 5Reininger R C, Gibson J D. Distributions of the two-dimensional DCT coefficients for images [ J ]. IEEE Transactions on Communications, 1983, 31(6) :835-839.
  • 6Wu M, Yu H, Liu B. Data hiding in image and video: Part Ⅱ- Designs and applications [ J ]. IEEE Transactions on Image Processing, 2003,12(6) :696-705.
  • 7Sayrol E, Vidal J, Cabanillas S, et al. Optimum watermark detection in color images[ A]. In: Proceedings of International Conference on Image Processing( ICIP 99 ) [ C ] , London, England, 1999:231-235.
  • 8Alexia B,Panagiotis T. Hidden messages in heavy-tails:DCT-domain watermark detection using alpha-stable models[ J]. IEEE Transctions on Multimedia, 2005,7(3 ) :700-715.
  • 9Hernandez J R, Amado M, Perez-gonzalez F. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure [ J ]. IEEE Transactions on Image Processing, 2000,9 ( 6 ) : 55 -68.
  • 10Birney K A, Fischer T R. On the modeling of DCT and subband image data for compression [ J ]. IEEE Transactions on Image Processing, 1995,4 ( 3 ) : 186-193.

同被引文献12

  • 1CHENG Q. Generalized embedding of multiplicative watermarks[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,(07):978-988.
  • 2CHENG Q,HUANG T S. Robust optimum detection of transform domain multiplicative watermarks[J].IEEE Transactions on Signal Processing,2003,(04):906-924.
  • 3CHENG Q,HUANG T S. An additive approach to transform-domain information hiding and optimum detection structure[J].IEEE Transactions on Multimedia,2001,(03):273-284.
  • 4ZHONG J,HUANG S. An enhanced multiplicative spread spectrum watermarking scheme[J].Transactions on Circuits and Systems for Video Technology,2006,(12):1491-1506.
  • 5JIA Y,LIN W,KASSIM A A. Estimating just-noticeable distortion for video[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,(07):820-829.
  • 6WEI Z,NGAN K N. Spatio-temporal just noticeable distortion profile for grey scale image/video in DCT domain[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,(03):337-346.
  • 7SHARIFI K,LEON-GARCIA A. Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video[J].IEEE Transactions on Circuits and Systems for Video Technology,1995,(01):52-56.
  • 8BUCCIGROSSI R W,SIMONCELLI E P. Image compression via joint statistical charscterization in the wavelet domain[J].IEEE Transactions on Image Processing,1999,(12):1688-1701.
  • 9MOORTHY A K,BOVIK A C. Visual importance pooling for image quality assessment[J].IEEE Journal of Selected Topics in Signal Processing,2009,(02):193-201.
  • 10毛家发,钮心忻,杨义先,时书剑.基于JPEG净图定量描述的隐写分析方法[J].电子学报,2011,39(8):1907-1912. 被引量:10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部